Secure Audit Logging with Tamper-Resistant Hardware.
Cheun Ngen ChongZhonghong PengPieter H. HartelPublished in: SEC (2003)
Keyphrases
- low cost
- hardware and software
- real time
- computer systems
- security analysis
- trusted computing
- identity management
- data mining techniques
- intrusion detection
- application level
- circuit design
- security issues
- computing power
- information systems
- hardware design
- massively parallel
- hardware implementation
- image processing
- key management
- security requirements
- computing systems
- user authentication
- website
- protection scheme
- parallel hardware